/
Mist - Bring Your Own AWS

Mist - Bring Your Own AWS

README

This package deploys all resources needed to support Mist event consumption. This configuration is designed to allow an institution to launch their AWS stack to capture logs coming from Mist, de-identify it within the institution's systems, and then forward to Degree Analytics for continued processing.

 

Cloud Formation Stack:

Current Lambda URI: 352676346183.dkr.ecr.us-east-1.amazonaws.com/school-event-handlers:mist_school_lambda_20250127155052_prod

Current API URI: 352676346183.dkr.ecr.us-east-1.amazonaws.com/school-event-handlers:mist_school_api_prod

┌───────────────────┐ │ API Client │ │ (external user) │ └─────────┬─────────┘ │ (HTTPS) ┌───────────────────┐ │ API Gateway │ │ (Public Entry) │ └───────┬───────────┘ (Optional) ───┼───> [ AWS WAFv2 ] ┌───────────┴────────────┐ │ Custom Authorizer │ │ (Lambda checks headers)│ └───────────┬────────────┘ │ "Allow" / "Deny" ┌───────────────────┐ │ VPC Link │ │ (private conduit) │ └─────────┬─────────┘ ┌─────────────────────────────────┐ │ Internal ALB (HTTP:80) │ │ (in private subnets, no public │ │ IP; reachable only via VPC) │ └───────────┬────────────────────┘ │ forwards to ECS tasks ┌─────────────────────────────────┐ │ ECS Fargate Service │ │ (Container w/ your app) │ └───────────┬────────────────────┘ │ [writes to Kinesis] ┌────────────────────────────┐ │ Kinesis Stream │ │ (on-demand, KMS-encrypted)│ └────────────┬───────────────┘ │ (event source) ┌────────────────────────┐ │ Lambda (container) │ │ "ProcessWifiEvents" │ └────────────────────────┘

Prerequisites Checklist

  1. IAM User Arn

    • User ARN: The person deploying this stack must have their IAM User ARN shared with Degree Analytics, so Degree Analytics can grant access to the container images. Ensure this user or the role they assume has CloudFormation and IAM permissions to create and modify resources (ECS, ALB, Kinesis, Lambda, API Gateway, etc.).

  2. VPC & Subnets

    • VPC with at least two private subnets, two public subnets in different Availability Zones (for the ECS tasks and the internal ALB), and a NAT gateway for the private subnets.

  3. Secrets Manager

    • Existing Secret: Create a Secrets Manager secret containing the required keys. For example:

    { "mist_api_key": "...", "da_api_key": "...", "deidentify_secret": "..." }

 

Checklist:

  1. Secret ARN: Copy the ARN of this secret. You’ll pass it to the stack as ExistingSecretArn.

  2. Env: dev or prod.

  3. VpcId: e.g., vpc-123abc.

  4. SchoolId (Get this from DA)

  5. PrivateSubnetIds: Comma-delimited subnets for ECS tasks and ALB.

  6. ExistingSecretArn: ARN of the secret from Step 3.

  7. ApiImageUri and LambdaImageUri: The Docker image URIs for ECS and Lambda, respectively.

  8. user_arn (to share with Degree Analytics): The IAM user or role that needs pull access to the images.

  9. (Optional) WAF ARN

    • If you want to attach an existing WAF Web ACL to the API Gateway stage, note its ARN. If not, set this parameter to None.

  10. (Optional) Health Monitoring ARN

    • If you have an SNS topic (or another endpoint) for alarms (4XX, 5XX, memory utilization, etc.), have that ARN ready. Otherwise, None.

Once these items are in place, you can deploy the CloudFormation stack with confidence.

Wrapping Up

You can find your HTTPS URL in the output section of the Stack, or by going to the API Gateway directionally and looking at the prod stage. Should look something like this:

Append the URL so that it is the {url}/api/v1/mist/events - this will be used to create the Mist Webhook. In Mist, go to Organization and select Settings

Then Add Webhook

Enter the URL, and make sure to provide the same secret as the mist_api_key from earlier as seen in the image below

 

image-20250106-183721.png

 

 

Related content